New Features and Functions of Junos Pulse Mobile Security Suite 4.1
|
|
- Pierce Everett Dickerson
- 7 years ago
- Views:
Transcription
1 PRODUCT BULLETIN Junos Pulse Mobile Security Suite 4.1 What s New Product Bulletin for Enterprises and Service Providers New Features and Functions of Junos Pulse Mobile Security Suite 4.1 Bulletin Date October 1, 2012 Bulletin Number Applicable to All Regions Effective Change Date: October 8, 2012 Introduction This Product Bulletin describes the new features and functions available in Juniper Networks Junos Pulse Mobile Security Suite version 4.1 for enterprises and service providers. This Product Bulletin assumes familiarity with Juniper Networks Junos Pulse 4.0 and 3.x, as well as the Junos Pulse Secure Access Service (SSL VPN). Junos Pulse Mobile Security Suite 4.1 continues to extend the reach of enterprises to manage personal or corporate-issued mobile device features, services and apps. In order to best meet their Bring Your Own Device (BYOD) and trusted mobility requirements, enterprises need to simplify mobile device provisioning for users and administrators alike, as well as ensure the security of devices accessing critical network and cloud resources, and the productivity of all users. Junos Pulse Mobile Security Suite 4.1 enables service providers and enterprises to simplify management of personal or corporate-issued mobile device features, services, and apps to meet their BYOD and trusted mobility needs, while simplifying mobile device and user provisioning, on-boarding, and administration. It also ensures device security when accessing critical network and cloud resources, supporting industry standards and increasing user productivity. Junos Pulse Mobile Security Suite 4.1 addresses the mobile security and device management needs of consumers, integrating and provisioning service provider branded device antivirus/ antimalware, loss and theft protection, as well as family monitoring and parental controls. It also offers service providers a seamless experience for on-boarding and service up-sell for their consumer customers, who get a quick, easy to use self-service provisioning console for mobile security and management. 1
2 New Features for Junos Pulse Mobile Security Suite 4.1 Table 1. New Junos Pulse Mobile Security Suite 4.1 Features by Mobile OS Junos Pulse Mobile Security Suite 4.1 Feature Enterprise Service Provider Android ios BlackBerry New Google Android feature restrictions (Camera, Bluetooth, Wi-Fi (for Samsung devices)) Device settings for Google Android (VPN, Wi-Fi, Microsoft Exchange ActiveSync) Support for Google Cloud Messaging (GCM) Enterprise prohibited applications Antivirus scan while charging Additional Apple ios restrictions App icon requirements Apple ios MDM import Junos Pulse Collaboration UI enhancements for ios Junos Pulse SSL VPN IPv6 support on ios Root/jailbreak detection Enhanced logging capabilities Coordinated Universal Time (UTC) support 3 3 Junos Pulse Mobile Security Gateway Administrator Console UI Enhancements (Phase 1) 3 3 Restore command API 3 New Features for Google Android in Junos Pulse Mobile Security Suite 4.1 New Google Android Feature Restrictions In previous versions of Junos Pulse Mobile Security Suite, the Junos Pulse Mobile Security Gateway web-based management console enabled administrators to issue policies restricting access to specific mobile operating system features such as camera, Bluetooth, and so on for Apple ios devices only. These restrictions were accomplished by using the mobile device management (MDM) mechanism native to the ios mobile operating system. In Junos Pulse Mobile Security Suite 4.1, Juniper has added a similar concept for Google Android-based mobile devices, although the specific Android features that can be restricted by policy differ from those available for ios. Google Android Feature Restrictions in Junos Pulse Mobile Security Suite 4.1 allow a Junos Pulse Mobile Security Gateway administrator to remotely configure an Android device via the Junos Pulse mobile app to block access to the following features: Camera Bluetooth Wi-Fi Android Camera Restriction Android camera restriction blocks access to the camera API in Android, which goes deeper than simply blocking the default camera app which is included in Android. This means that should a user attempt to circumvent the camera restriction by downloading a separate camera app to the Android device from Google Play, the downloaded camera app would also be blocked. This feature is only supported on mobile devices running Google Android 4.0 (Ice Cream Sandwich) or later. It is also compatible with the Samsung MDM API 2.0 or later. Android Bluetooth Restriction Android Bluetooth Restriction disables Bluetooth on an Android device. Should the user reinitiate Bluetooth on the Android mobile device, the Junos Pulse client app will periodically check the device s Bluetooth state and if it has been re-enabled, the restriction will enforce compliance and automatically disable it. This feature is only supported on Android-based Samsung mobile devices containing Samsung MDM API 2.0 or later. Android Wi-Fi Restriction Android Wi-Fi Restriction disables Wi-Fi access from an Android device. Should the user attempt to reengage Wi-Fi on an Android mobile device, the restriction detects that Wi-Fi has been reenabled, and will once again disable it. This feature is only supported on Android-based Samsung mobile devices containing Samsung MDM API 2.0 or later. 2
3 Device Settings for Google Android Junos Pulse Mobile Security Suite 4.1 adds enhanced provisioning capabilities for Google Android devices, similar to those available in earlier versions of Junos Pulse Mobile Security Suite for Apple ios devices. These features make the provisioning of Android devices quicker and easier for administrators, while centralizing all of the necessary provisioning for Android devices in one location. Junos Pulse Mobile Security Suite 4.1 enhances provisioning on Android devices for: VPNs Wi-Fi Microsoft Exchange ActiveSync (EAS) Android VPN Provisioning Similar to the Apple ios MDM capabilities in the previous release of Junos Pulse Mobile Security Suite, version 4.1 adds the capability to remotely configure VPN settings such as adding, modifying, or removing an accept point configuration for Android devices from the Junos Pulse Mobile Security Gateway. The VPN configuration details allow the built-in VPN client in the Junos Pulse mobile app to be configured. Android VPN provisioning is available for Android devices running Android 4.0 and higher, as well as Samsung devices running Android or higher. For a complete list of supported devices, please refer to the Supported Platforms document at: en_us/release-independent/junos-pulse-mobile/index.html. The Android VPN Provisioning feature continues to support VPN Proxy, and adds support for VPN On-Demand. Android Wi-Fi Provisioning Following the lead set by the Apple ios MDM capabilities of the previous release, Junos Pulse Mobile Security Suite 4.1 adds the ability to remotely configure Wi-Fi configuration settings such as adding, modifying, or removing an access point configuration on Android devices from the Junos Pulse Mobile Security Gateway. Android Wi-Fi Provisioning allows Junos Pulse Mobile Security Gateway administrators to preconfigure Android devices for access to protected wireless networks using a variety of authentication mechanisms. In version 4.1, support for both Extensible Authentication Protocol Protected Extensible Authentication Protocol (EAP-PEAP) and Extensible Authentication Protocol Tunneled TLS (EAP-TTLS) are included. Android Wi-Fi Provisioning can also fully control the changing of the active service set identifier (SSID). This makes many use cases such as the provisioning of captive portals by wireless LAN devices much more intuitive. Android Wi-Fi Provisioning, for which settings are sent from the Junos Pulse Mobile Security Gateway to the Android device running the Junos Pulse client app, uses XML as the medium to transport the settings (over Simple Object Access Protocol (SOAP) for Android). Android Wi-Fi policies are communicated in a lightweight format, which enables the Junos Pulse Mobile Security Gateway to configure the policy settings onto the Android device via native Android APIs. Android Microsoft Exchange ActiveSync Provisioning (Samsung Devices Only) Microsoft Exchange ActiveSync (EAS) profiles contain configuration data to allow for the synchronization of , contacts, calendar, tasks, and notes from a messaging server to a mobile device. Similar to the ios MDM capabilities in the previous release, Junos Pulse Mobile Security Suite 4.1 adds the ability for administrators to remotely configure Microsoft EAS account information such as adding, modifying, or removing an EAS profile from the Junos Pulse Mobile Security Gateway. Support for Google Cloud Messaging (GCM) Google Cloud Messaging is a framework from Google which allows application servers to send lightweight messages to Android applications. It is available for devices running all supported Android versions, and the devices must have the Google Play Store app installed to be eligible. For more details on supported versions of Android, please consult the latest Junos Pulse Supported Platforms Guide at Currently, the Junos Pulse Mobile Security Gateway utilizes the GCM predecessors, Cloud to Device Messaging (C2DM) or Short Message Service messages to deliver commands to mobile devices. However, C2DM has been superseded by GCM, and SMS can have reliability issues, particularly in certain parts of the world. The use of GCM enhances the command delivery mechanism in Junos Pulse Mobile Security Suite, making it less costly and much more reliable worldwide. Junos Pulse Mobile Security Suite 4.1 via the Junos Pulse Mobile Security Gateway will continue to make best efforts to ensure that messages are delivered to user mobile devices by first attempting delivery with GCM, and should that fail, will use SMS as a secondary delivery method. The status of delivery is displayed on the Devices page, allowing administrators to easily determine which devices have not yet responded to sent commands. Root/Jailbreak Detection (for Android and ios) In order to secure a Google Android or Apple ios mobile device, and to determine if the mobile device should be allowed to access a secure network or cloud, enterprises, service providers, and other customers need to know whether the device has been compromised. In other words, has the Android device been rooted or the ios device been jailbroken? Jailbroken ios devices and rooted Android devices can bring with them their own security issues. For instance, a jailbroken ios or rooted Android device can sideload software through channels and app stores other than official app stores such as Google Play or the Apple App Store. Also, jailbroken and rooted devices can leave open access to protected features and file system areas, which can be infested with malware such as spyware. These capabilities represent new risk points for service providers, enterprises and their users with respect to securing their network, as well as mobile device access to their network, cloud, and resources. 3
4 This feature builds on top of the existing Junos Pulse client app support for determining rooted and jailbroken mobile devices, while adding a reporting feature into the Junos Pulse Mobile Security Gateway. Mobile users who have rooted or jailbroken their mobile device will have an indicator when their device attempts to access the service provider or enterprise network. A dedicated report can also be run from the Pulse Mobile Security Gateway that shows any rooted or jailbroken mobile devices. Junos Pulse Application Icon Requirements Sometimes there is an overwhelming number of notification icons on Google Android devices. In order to address this issue and make notifications more acceptable and usable for Android device users, Junos Pulse Mobile Security Suite 4.1 includes a single unified notification icon to represent the sum of all information on and about the device s state. The various notification icons have been combined into a single icon. The single icon graphic has been made dynamic in order to represent the available device states, based on a priority order. Several notification states have been identified, each with a specific icon. Regardless of how many notifications are present, the most critical notification icon is displayed first and on top. As each next most critical item is dealt with, the single icon changes to the next most critical device state, until it reaches the idle state. On Android, a distinction had to be made between Notifications and Alerts, in order to properly order them. For active alerts, Juniper defers to the higher priority notification, which typically requires a user s immediate action, such as device registration needed, password policy incompliance, device administrative status not granted, and so on. On the other hand, for active notifications, Juniper defers to events that have occurred or are occurring which do not usually require any user action, such as scanning is in progress, VPN session is established, and so forth. Options that are accomplished through specific branding and client configuration toolkit (CCTK) are provided in the Junos Pulse Mobile Security Gateway for administrators to enable/disable an always-on icon to be shown when no other alerts are present. Enterprise Prohibited Applications Junos Pulse Mobile Security Suite 4.0 introduced the Prohibited Applications feature for Android users and devices. In that release, the Prohibited Applications list was only configurable at the root level, which meant that all Android devices on the Junos Pulse Mobile Security Gateway would receive the same application blacklist data. Now, in Junos Pulse Mobile Security Suite 4.1, Juniper has extended the Prohibited Applications list mechanism for the partner and enterprise levels, while keeping the root level configuration intact. The lists of prohibited applications are additive, such that if application A is listed at root level, application B at partner level, and application C at enterprise level, then a device registering to the enterprise level will receive a list with all three apps (applications A, B, and C) prohibited. This flexibility allows partner level and enterprise level Junos Pulse Mobile Security Gateway administrators to configure prohibited application lists without conflicting with each other, which lets Juniper and our service providers host more customers on fewer Pulse Mobile Security Gateway instances, with fewer conflicts. Please note that Enterprise Prohibited Applications are only viewable and configurable from the Junos Pulse Mobile Security Gateway administrator console. Antivirus Scan While Charging The periodic full scan of a user s mobile device can be CPU intensive and also be a drain on the device s battery. Junos Pulse Mobile Security Suite 4.1 enables the periodic full device antivirus scan to start only when a device is plugged into a power source such as an A/C adapter or USB. If a full device antivirus scan is overdue, and the device is not connected to a power source, a notification will be shown indicating that a full device scan is needed, and the scan button will turn to amber with a warning message. When the user connects the device to a power source, a full antivirus device scan will commence, and a pop-up message will be displayed that will warn the user that charging the device may take longer as a full antivirus device scan has been initiated. The pop-up message text is configurable, and the number of times the pop-up message is shown on the user s device is also configurable. Should a user cancel the full device antivirus scan, that cycle will be skipped and a new pop-up message will be shown on the user s device, stating that the scan will start in the next cycle. Google Android Enhanced Logging Capabilities Junos Pulse Mobile Security Suite 4.1 includes improved logging support to enable faster and easier troubleshooting, if needed. Logging enhancements have been made for Google Android, including entries generated around registration (particularly autoregistration), enabling Logcat logs of up to 2 MB to be sent from the client, and the ability to attach more log files to s. New Features for Apple ios in Junos Pulse Mobile Security Suite 4.1 Additional Apple ios Restrictions In prior versions of the Junos Pulse Mobile Security Suite, the Junos Pulse Mobile Security Gateway supported Apple ios Restrictions as defined by Apple in its iphone Configuration Utility (IPCU). Since the last release of Junos Pulse Mobile Security Suite, Apple has added new capabilities which may be restricted in its IPCU. These new restrictions include: Allow/Disallow Siri Allow/Disallow diagnostic data to be sent to Apple Allow/Disallow user to accept untrusted Transport Layer Security (TLS) certificates These new restrictions enable administrators to limit use of and address potential security issues in convenience features in ios devices, including Siri, limiting outgoing and potentially sensitive data being sent to the manufacturer, and ensuring that only trusted certificates are accepted by users. These additional ios restrictions show up as additional restriction checkboxes in the Junos Pulse Mobile Security Gateway, under the Enterprise ios Profiles. Apple ios MDM Import Apple s IPCU application is a tool that helps administrators build Apple ios profile configurations. The IPCU application supports export functionality. Therefore, the main goals Juniper is addressing with this functionality is to allow administrators to leverage an existing available tool with which they may already be familiar and with which they may have already created existing configurations, thus enabling service providers and enterprises 4
5 to support new Apple ios mobile device management (MDM) features as soon as they are released by Apple. Imported profiles may be used for ios devices only, but lack any Android-specific MDM configuration options. Imported profiles cannot be modified, and are presented in their original format (i.e., imported profiles are not editable via the Pulse Mobile Security Gateway user interface). Imported profiles can also be exported again later, still in their native XML format. For administrators who regularly use Apple s IPCU application to generate profile configurations that are deployed to individual ios devices, the ability to import already created configuration profiles into the Pulse Mobile Security Gateway, and to deploy them to ios devices is a huge time saver. Additionally, Apple regularly adds new features to ios and the IPCU. If support for a new ios feature is in the IPCU but has not yet been added to the Pulse Mobile Security Gateway console, administrators may create the necessary profile configuration in the Apple IPCU and export it. The newly created configuration profile may be imported to the Pulse Mobile Security Gateway console, and then deployed to ios devices by the administrator. In this manner, new ios features that may not yet be supported in the Pulse Mobile Security Gateway, but are supported and available for profile configurations in Apple s IPCU, can be exported/imported to the Pulse Mobile Security Gateway and deployed to ios devices anyway. For more information on Apple s IPCU, please refer to the following: Junos Pulse Collaboration Enhancements for Apple ios Mobile devices have phone (audio) capability via a native carrierenabled phone application or through VoIP applications like Skype, Google Voice, etc. These applications allow users to dial in to audio conference bridges directly from their mobile device. By just providing plain text data for teleconference information, the end user experience is not optimized, and it is a convoluted process to access the audio conference. First, the user needs to find the correct phone number, select the number, copy text, launch the phone app, paste the number, and then finally get connected. However, the user is not yet finished. Once the call is connected, the bridge will ask for the participant code. The user will need to switch back to Junos Pulse, find the participant code, write down the number or memorize it since copy and paste will not work after the call has been connected, switch to the phone app, manually type in all of the digits, and finally finish the dialing process. This feature simplifies the above series of steps into a single tap to provide the optimal user experience for Junos Pulse Collaboration users on ios devices. Users will launch the Junos Pulse Collaboration ios client from the mobile link in the meeting invitation. Once they join the meeting, they will choose to call into the conference bridge from the client. Because the conference bridge profile is already configured by Juniper s SSL VPN and the meeting host, the Junos Pulse Collaboration client presents a list of dialing numbers from which users will select the appropriate number from the list, and the client will dial the selected number and associated participant code, with a pause automatically inserted. The user is then connected to the conference bridge. Usability is the primary goal end users desire while using their mobile phones and tablets. This change makes Junos Pulse Collaboration more user friendly and easier to use on ios. Root/Jailbreak Detection (for Android and ios) In order to secure a Google Android or Apple ios mobile device, and to determine if the mobile device should be allowed to access a secure network or cloud, customers (enterprises, service providers, and others) need to know whether the device has been compromised in other words, has the Android device been rooted or the ios device been jailbroken. Jailbroken ios devices and rooted Android devices can bring with them their own security issues. For instance, a jailbroken ios or rooted Android device can sideload software through channels and app stores other than official app stores such as Google Play or the Apple App Store. Also, jailbroken and rooted devices can leave open access to protected features and file system areas, which can be infested with malware such as spyware. These capabilities represent new risk points for service providers and enterprises with respect to securing the network, as well as mobile device access to their network, cloud, and resources. This feature builds on top of the existing Junos Pulse client app support for determining rooted and jailbroken mobile devices, while adding a reporting feature into the Junos Pulse Mobile Security Gateway. Mobile users who have rooted or jailbroken their mobile device would have an indicator when their device attempts to access the service provider or enterprises network. A dedicated report can also be run from the Pulse Mobile Security Gateway that lists any rooted or jailbroken mobile devices. Junos Pulse SSL VPN IPv6 Support on Apple ios Many customers, including service providers, large enterprises, and government agencies, are seeking support for IPv6. These customers with mobile endpoints accessing their network and resources are asking for IPv6 support to be available for major mobile platforms. With this feature, an Apple ios endpoint connecting from an IPv6 network is allowed to connect to the IPv6 interface of Juniper SSL VPN gateways/appliances, such as the Juniper Networks MAG Series Junos Pulse Gateways or the SA Series SSL VPN Virtual Appliances. However, if the applications in the ios endpoint require access to protected resources which are on an IPv4 network, and the ios endpoint is coming from an IPv4 network and connecting to the IPv4 interface of the Juniper SSL VPN gateway/appliance, the current behavior is preserved. Juniper SSL VPN gateways/appliances allow simultaneous connections from IPv4 and IPv6 ios endpoints. In cases where Junos Pulse is connecting to a Juniper SSL VPN gateway/ appliance using a hostname, depending on the hostname to IP resolution of the Juniper SSL VPN gateway/appliance at the endpoint, Junos Pulse will decide to connect to the Juniper SSL VPN gateway/appliance on an IPv6 or an IPv4 network. Apple ios Enhanced Logging Capabilities Junos Pulse Mobile Security Suite 4.1 includes improved logging support, enabling faster and easier troubleshooting when needed. Additional logging has been introduced for Apple ios device registration (particularly auto-registration), additional device information parameters, and additional configuration options. 5
6 New Features for BlackBerry in Junos Pulse Mobile Security Suite 4.1 Junos Pulse Application Icon Requirements (for Android and BlackBerry) As discussed in Junos Pulse Application Icon Requirements in the New Features for Google Android in Junos Pulse Mobile Security Suite 4.1 section, Junos Pulse Mobile Security Suite 4.1 has a single unified notification icon to represent the sum of all information on and about a BlackBerry device s state to make notifications more acceptable and usable for BlackBerry device users. The various notification icons have been combined into a single icon. The single icon graphic has been made dynamic in order to represent the available device states based on a priority order. Several notification states were identified, each with a specific icon. Regardless of how many notifications are present, the most critical notification icon is displayed first and on top. As each next most critical item is dealt with, the single icon changes to the next most critical device state, until it reaches the idle state. For BlackBerry, changes were applied to the Alerts icon on the home screen. For active alerts, Juniper defers to the higher priority notification, which typically requires a user s immediate action, such as device registration needed, password policy incompliance, device administrative status not granted, and so on. Options that are accomplished through specific branding and CCTK are provided in the Junos Pulse Mobile Security Gateway for administrators to enable/disable an always-on icon to be shown when no other alerts are present. BlackBerry Enhanced Logging Capabilities Junos Pulse Mobile Security Suite 4.1 includes improved logging support that enables faster and easier troubleshooting when needed. Enhancements for BlackBerry logs include logging of more parameters (especially regarding registration and autoregistration), making the Send Logs function available on Juniper Professional Services (ProServe) customized builds, with device information being included in the Send Logs function, as well. New Junos Pulse Mobile Security Gateway 4.1 Features/Enhancements Junos Pulse Mobile Security Gateway Administrator Console UI Enhancements (Phase 1) Junos Pulse Mobile Security Suite 4.1 has updated the workflows and user interface of the Junos Pulse Mobile Security Gateway, with the goal of making the administrator console UI simpler to use, easier to work with, and overall more user friendly. Workflows (navigating from page to page, executing actions, finding information, etc.) have also been improved and simplified. Some of the major, high-level changes to the administrator user interface of the Junos Pulse Mobile Security Gateway include: Redesigning the user interface appearance, and grouping tabs throughout the Pulse Mobile Security Gateway Improving Search capabilities and returned results Reworking the Device Information page with embedded Profile Manager Redesigning the User Account and Account Management pages Merging the Device Profile page UI Enhancing Role Management for better use by enterprises Overhauling the Password Manager page Applying more consistent branding, and design and color elements across the Pulse Mobile Security Gateway In short, the look, feel, and usability of the Pulse Mobile Security Gateway administrator console UI were improved in Junos Pulse Mobile Security Suite 4.1. Restore Command API The latest version of the Junos Pulse Mobile Security Gateway includes an API which enables a restore command to be sent to the Pulse Mobile Security Gateway. This enables data deleted from a user s device to be restored as of the last backup. This restore command is a particularly useful feature for service providers who wish to offer a backup/restore feature to their users, as well as for users who have deleted data from their device and wish to restore that data. For example, in the event a customer accidentally deletes all PIM data from a mobile device and would like to restore that data from the latest backup, the user would simply log into the portal and restore backup data. Universal Time Coordinated (UTC) Support In Junos Pulse Mobile Security Suite 4.0, the Junos Pulse Mobile Security Gateway saves and displays the date and time using the server system time, which is the local time at the location at which the Pulse Mobile Security Gateway is deployed. This can be a problem when multiple instances of Pulse Mobile Security Gateways are deployed in different time zones and when attempting to display localized times to administrators using the Pulse Mobile Security Gateway console. For example, consider the scenario where multiple Pulse Mobile Security Gateway instances are deployed in data centers located in different time zones for disaster recovery (DR) purposes. If the primary Pulse Mobile Security Gateway instance fails, the backup instance will incorrectly recover the data from the database in the local time zone of the primary instance, instead of its own local time. To address these issues, the Pulse Mobile Security Gateway saves dates and times in the UTC format in the database, but converts it to a user s local time prior to presenting it to the user. Replacing the partner/enterprise navigation tree pane with a breadcrumb style navigation design 6
7 About Juniper Networks Juniper Networks is in the business of network innovation. From devices to data centers, from consumers to cloud providers, Juniper Networks delivers the software, silicon and systems that transform the experience and economics of networking. The company serves customers and partners worldwide. Additional information can be found at Corporate and Sales Headquarters APAC Headquarters EMEA Headquarters To purchase Juniper Networks solutions, Juniper Networks, Inc North Mathilda Avenue Juniper Networks (Hong Kong) 26/F, Cityplaza One Juniper Networks Ireland Airside Business Park please contact your Juniper Networks representative at or Sunnyvale, CA USA 1111 King s Road Swords, County Dublin, Ireland authorized reseller. Phone: 888.JUNIPER ( ) Taikoo Shing, Hong Kong Phone: or Phone: EMEA Sales: Fax: Fax: Fax: Copyright 2012 Juniper Networks, Inc. All rights reserved. Juniper Networks, the Juniper Networks logo, Junos, NetScreen, and ScreenOS are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property of their respective owners. Juniper Networks assumes no responsibility for any inaccuracies in this document. Juniper Networks reserves the right to change, modify, transfer, or otherwise revise this publication without notice EN Oct 2012 Printed on recycled paper 7
SECURING TODAY S MOBILE WORKFORCE
WHITE PAPER SECURING TODAY S MOBILE WORKFORCE Connect, Secure, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2011, Juniper Networks, Inc. Table
More informationDeploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
More informationIF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL
IF-MAP FEDERATION WITH JUNIPER NETWORKS UNIFIED ACCESS CONTROL An illustrated Guide to Configuring a Simple IF-MAP Federated Network Juniper Networks, Inc. 1 Table of Contents Introduction...3 Scope...3
More informationMobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.
White Paper Securing Today s Mobile Workforce Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite Copyright 2012, Juniper Networks, Inc. 1 Table
More informationSECURE ACCESS TO THE VIRTUAL DATA CENTER
SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need
More informationThe dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more
The dramatic growth in mobile device malware continues to escalate at an ever-accelerating pace. These threats continue to become more sophisticated while the barrier to entry remains low. As specific
More informationVMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES
APPLICATION NOTE VMWARE VIEW WITH JUNIPER NETWORKS SA SERIES SSL VPN APPLIANCES Configuring Secure SSL VPN Access in a VMware Virtual Desktop Environment Copyright 2010, Juniper Networks, Inc. 1 Table
More informationJunos Pulse: Securing Today s Mobile Life
Junos Pulse: Securing Today s Mobile Life An Integrated Approach to Mobile Security, Device and Application Management, and Secure Network Access Today s Mobile Life - Overview Today, our world is digital,
More informationSecure, Mobile Access to Corporate Email, Applications, and Intranet Resources
APPLICATION NOTE Juniper NETWORKS SSL VPN and Windows Mobile Secure, Mobile Access to Corporate Email, Applications, and Intranet Resources Table of Contents Introduction.........................................................................................
More informationPULSE SECURE FOR GOOGLE ANDROID
DATASHEET PULSE SECURE FOR GOOGLE ANDROID Product Overview In addition to enabling network and resource access for corporate managed mobile devices, many enterprises are implementing a Bring Your Own Device
More informationCOORDINATED THREAT CONTROL
APPLICATION NOTE COORDINATED THREAT CONTROL Interoperability of Juniper Networks IDP Series Intrusion Detection and Prevention Appliances and SA Series SSL VPN Appliances Copyright 2010, Juniper Networks,
More informationJunos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with Simplicity and Agility
White Paper Transitioning Enterprise Customers to the Cloud with Junos Pulse Junos Pulse Secure Access Service Enables Service Providers to Deliver Scalable and On-Demand, Cloud-Based Deployments with
More informationSOLUTION BROCHURE. Lifecycle Wireless Infrastructure, Security and Services Management
SOLUTION BROCHURE Wireless LAN Management Solution Overview Lifecycle Wireless Infrastructure, Security and Services Management Wireless LAN Management Solution Overview A successful wireless LAN (WLAN)
More informationNetwork and Security. Product Description. Product Overview. Architecture and Key Components DATASHEET
DATASHEET Network and Security Manager Product Overview Network and Security Manager provides unparalleled capability for device and security policy configuration, comprehensive monitoring, reporting tools,
More informationNETWORK AND SECURITY MANAGER APPLIANCES (NSMXPRESS AND NSM3000)
DATASHEET NETWORK AND SECURITY MANAGER APPLIANCES ( AND ) Product Overview Now more than ever, network operators need the ability to easily manage security policies and to have visibility into potential
More informationPRODUCT CATEGORY BROCHURE. Juniper Networks SA Series
PRODUCT CATEGORY BROCHURE Juniper Networks SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations
More informationConfiguring and Implementing A10
IMPLEMENTATION GUIDE Configuring and Implementing A10 Networks Load Balancing Solution with Juniper s SSL VPN Appliances Although Juniper Networks has attempted to provide accurate information in this
More informationJunos Pulse for Google Android
Junos Pulse for Google Android User Guide Release 4.0 October 2012 R1 Copyright 2012, Juniper Networks, Inc. Juniper Networks, Junos, Steel-Belted Radius, NetScreen, and ScreenOS are registered trademarks
More informationJUNOS PULSE APPCONNECT
White Paper JUNOS PULSE APPCONNECT A Micro VPN That Allows Specific Applications on Mobile Devices to Independently Leverage the Connect Secure Gateway Copyright 2014, Juniper Networks, Inc. 1 Table of
More informationReasons Enterprises. Prefer Juniper Wireless
Reasons Enterprises Prefer Juniper Wireless Juniper s WLAN solution meets the mobility needs of today s enterprises by delivering the highest levels of reliability, scalability, management, and security.
More informationPRODUCT CATEGORY BROCHURE
IDP Series Intrusion Detection and Prevention Appliances PRODUCT CATEGORY BROCHURE Staying One Step Ahead With the accelerating number of applications allowed in from the Internet and the higher frequency
More informationIncrease Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
More informationPRODUCT CATEGORY BROCHURE
PRODUCT CATEGORY BROCHURE SA Series SSL VPN Appliances Juniper Networks SA Series SSL VPN Appliances Lead the Market with Secure Remote Access Solutions That Meet the Needs of Organizations of Every Size
More informationJunos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document
Junos Pulse Access Control Service 4.4R4-MDM Supported Platforms Document Junos Pulse Access Control Service 4.4R4-MDM Build #22687 OAC Version 5.60.22687 Junos Pulse Client Version 4.0.4.38461 Juniper
More informationSA Series SSL VPN Virtual Appliances
SA Series SSL VPN Virtual Appliances Data Sheet Published Date July 2015 Product Overview The world s mobile worker population passed the 1 billion mark in 2010 and will grow to more than 1.3 billion by
More informationNETWORK AND SECURITY MANAGER
DATASHEET NETWORK AND SECURITY MANAGER Product Overview Juniper Networks Network and Security Manager (NSM) is a unified device management solution for Juniper s network infrastructure of routing, switching
More informationAdministration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
More informationPERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY
APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................
More informationJuniper Networks Solution Portfolio for Public Sector Network Security
SOLUTION BROCHURE Juniper Networks Solution Portfolio for Public Sector Network Security Protect against Network Downtime, Control Access to Critical Resources, and Provide Information Assurance Juniper
More informationBuilding a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014
Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts
More informationBlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
More informationJUNIPER NETWORKS WIRELESS LAN SOLUTION
SOLUTION BROCHURE JUNIPER NETWORKS WIRELESS LAN SOLUTION Deliver Secure, Scalable, and Reliable Campus Mobility While Maximizing Performance and Minimizing Cost of Ownership Wireless LAN Solution Overview
More informationIdentity-Based Application and Network Profiling
Application Note Identity-Based Application and Network Profiling Using UAC in Conjunction with NSM, IDP and Infranet Enforcers Permits User-Identified Application and Network Profiling Juniper Networks,
More informationJunos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
More informationRemote Access Protection
IMPLEMENTATION GUIDE Remote Access Protection Best Practices for Implementing Remote Access Protection Using Juniper Networks SA Series SSL VPN Appliances, IDP Series Intrusion Detection and Prevention
More informationInstallation Instructions
Avira Free Android Security Installation Instructions Trademarks and Copyright Trademarks Windows is a registered trademark of the Microsoft Corporation in the United States and other countries. All other
More informationDEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES
APPLICATION NOTE DEPLOYING IP TELEPHONY WITH EX SERIES ETHERNET SWITCHES Optimizing Applications with Juniper Networks Access Switches Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
More informationConfiguring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways
APPLICATION NOTE Dynamic VPN Configuring and Deploying the Dynamic VPN Feature Using SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 Table of Contents Introduction.....................................................................................................3
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
More informationIdentity-Based Traffic Logging and Reporting
Application Note Identity-Based Traffic Logging and Reporting Using UAC in Conjunction with NSM and Infranet Enforcers to Give Additional, User-Identified Visibility into Network Traffic Juniper Networks,
More informationios Enterprise Deployment Overview
ios Enterprise Deployment Overview ios devices such as ipad and iphone can transform your business. They can significantly boost productivity and give your employees the freedom and flexibility to work
More informationSoLuTIoN guide. CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork
SoLuTIoN guide CLoud CoMPuTINg ANd ThE CLoud-rEAdy data CENTEr NETWork Contents BENEfITS of ThE CLoud-rEAdy data CENTEr NETWork............................3 getting ready......................................................................3
More informationFeature List for Kaspersky Security for Mobile
Feature List for Kaspersky Security for Mobile Contents Overview... 2 Simplified Centralized Deployment... 2 Mobile Anti-Malware... 3 Anti-Theft / Content Security... Error! Bookmark not defined. Compliance
More informationMIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS
APPLICATION NOTE MIGRATING IPS SECURITY POLICY TO JUNIPER NETWORKS SRX SERIES SERVICES GATEWAYS Migrating Advanced Security Policies to SRX Series Services Gateways Copyright 2009, Juniper Networks, Inc.
More informationMobile Device Manager. Windows User Guide (Windows Phone 8/RT)
Mobile Device Manager Windows User Guide (Windows Phone 8/RT) Document Revision Date: Oct. 22, 2014 Mobile Device Manager Windows Phone 8 User Guide i Contents Windows Phone 8 Features Matrix... 1 Overview...
More information2016 Xerox ConnectKey Technology-enabled MFPs Comparison White Paper
06 Xerox ConnectKey Technology-enabled MFPs Comparison White Paper Executive Summary The information in this document is intended to provide a summary, or where appropriate to avoid duplication, a reference
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationFrequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
More informationCorporate-level device management for BlackBerry, ios and Android
B L A C K B E R R Y E N T E R P R I S E S E R V I C E 1 0 Corporate-level device management for BlackBerry, ios and Android Corporate-level (EMM) delivers comprehensive device management, security and
More informationMONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES
APPLICATION NOTE MONITORING NETWORK TRAFFIC USING sflow TECHNOLOGY ON EX SERIES ETHERNET SWITCHES Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2010, Juniper Networks,
More informationJunos Space for Android: Manage Your Network on the Go
Junos Space for Android: Manage Your Network on the Go Combining the power of Junos Space and Android SDKs to build powerful and smart applications for network administrators Challenge It is important
More informationJunos Pulse Mobile Security Dashboard
Junos Pulse Mobile Security Dashboard User Guide Release 4.0 June 2012 R1 Copyright 2012, Juniper Networks, Inc. . Junos Pulse Mobile Security Dashboard Juniper Networks, Inc. 1194 North Mathilda Avenue
More informationUsing Devices. Chapter 3
Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform
More informationKaspersky Security for Mobile Administrator's Guide
Kaspersky Security for Mobile Administrator's Guide APPLICATION VERSION: 10.0 SERVICE PACK 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful and that
More informationMTP. MTP AirWatch Integration Guide. Release 1.0
MTP MTP AirWatch Integration Guide Release 1.0 FireEye and the FireEye logo are registered trademarks of FireEye, Inc. in the United States and other countries. All other trademarks are the property of
More informationSecurity That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation
White Paper Securing Multi-Tenancy and Cloud Computing Security That Ensures Tenants Do Not Pose a Risk to One Another In Terms of Data Loss, Misuse, or Privacy Violation Copyright 2012, Juniper Networks,
More informationProduct Description. Product Overview
DATASHEET vgw Gateway Product Overview The vgw Gateway provides a best-in-class virtual firewall to meet the unique security challenges of virtual data centers and clouds. IT teams can now secure their
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationJ-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
More informationDemonstrating the high performance and feature richness of the compact MX Series
WHITE PAPER Midrange MX Series 3D Universal Edge Routers Evaluation Report Demonstrating the high performance and feature richness of the compact MX Series Copyright 2011, Juniper Networks, Inc. 1 Table
More informationSecure, Centralized, Simple
Whitepaper Secure, Centralized, Simple Multi-platform Enterprise Mobility Management 2 Controlling it all from one place BlackBerry Enterprise Service 10 (BES10) is a unified, multi-platform, device, application,
More informationCortado Corporate Server
Cortado Corporate Server 100 % On Premise Installed & Run Entirely On Your Corporate Network Feature Mobile Device Device Policy Application E-mail Push Wi-Fi Configuration Push Enable secure BYOD and
More informationConfiguration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationHow To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
More informationENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS
SOLUTION BRIEF ENTERPRISE SOLUTION FOR DIGITAL AND ANALOG VOICE TRANSPORT ACROSS IP/MPLS IT Organizations Can Reduce Costly TDM Leased Line Fees Challenge IP networks were not designed to transport bit-synchronous
More informationWHITE PAPER. Copyright 2011, Juniper Networks, Inc. 1
WHITE PAPER Network Simplification with Juniper Networks Technology Copyright 2011, Juniper Networks, Inc. 1 WHITE PAPER - Network Simplification with Juniper Networks Technology Table of Contents Executive
More informationSophos Mobile Control user help. Product version: 6.1
Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationSymantec App Center. Mobile Application Management and Protection. Data Sheet: Mobile Security and Management
Mobile Application Management and Protection Data Sheet: Mobile Security and Management Overview provides integrated mobile application and device management capabilities for enterprise IT to ensure data
More informationOptimizing VoIP Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches
APPLICATION NOTE Deploying IP Telephony with JUNIPER NETWORKS ETHERNET Switches Optimizing Applications with Juniper Networks EX3200 and EX4200 Line of Ethernet Switches Copyright 2009, Juniper Networks,
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationEnd User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
More informationConfiguration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationFromdistance MDM. Setting the standard in device management
Fromdistance MDM Setting the standard in device management GOAL to make mobile devices part of Enterprise Information System MAIN PRODUCT Fromdistance MDM (Mobile Device Manager) Mobile device management
More informationXperia TM. in Business. Email and apps. Read about how Xperia devices manage email and synchronisation in a corporate IT environment.
Xperia TM in Business Email and apps Read about how Xperia devices manage email and synchronisation in a corporate IT environment April 2016 About this document Products covered This document describes
More informationTECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available
More informationPremium Design Phone with Smartphone Connect
Smartphone Connect App Guide Premium Design Phone with Smartphone Connect Model No. KX-PRW130 Thank you for purchasing a Panasonic product. This document explains how to use the Smartphone Connect app.
More informationVoice Modules for the CTP Series
DATASHEET Voice Modules for the CTP Series Product Overview Enterprise organizations are leveraging the cost savings associated with IP transport for a variety of new packet based multimedia services.
More informationSIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT
DATASHEET SIMPLIFY MULTI-PLATFORM ENTERPRISE MOBILITY MANAGEMENT Silver level EMM Enterprise Mobility Management for Corporate-owned and BYOD devices BlackBerry Enterprise Service 10 is a powerful device,
More informationKaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
More informationWEB FILTERING FOR BRANCH SRX SERIES AND J SERIES
APPLICATION NOTE WEB FILTERING FOR BRANCH SRX SERIES AND J SERIES Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2010, Juniper Networks, Inc. 1
More informationJUNOScope IP Service Manager
Datasheet JUNOScope IP Service Manager Product Description As service providers and enterprises evolve to meet the demands of their customer base, one key to success is the enhancement of operational efficiencies
More informationWave 4.5. Wave ViewPoint Mobile 2.0. User Guide
Wave 4.5 Wave ViewPoint Mobile 2.0 User Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Applications
More informationMeeting PCI Data Security Standards with
WHITE PAPER Meeting PCI Data Security Standards with Juniper Networks STRM Series Security Threat Response Managers When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationAPPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION
APPENDIX B1 - FUNCTIONALITY AND INTEGRATION REQUIREMENTS RESPONSE FORM FOR A COUNTY HOSTED SOLUTION Response Code: Offeror should place the appropriate letter designation in the Availability column according
More informationIntroduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
More informationWeb Filtering For Branch SRX Series and J Series
APPLICATION NOTE Web Filtering For Branch SRX Series and J Series Configuring Web Filtering on Branch SRX Series Services Gateways and J Series Services Routers Copyright 2009, Juniper Networks, Inc. Table
More informationPrinterOn Embedded Application For Samsung Printers and MFPs
PrinterOn Embedded Application For Samsung Printers and MFPs Table of Contents 1. Introduction... 3 2. Setup and Service Prerequisites... 4 3. How to Purchase the PrinterOn Service... 5 4. How to install
More informationNotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices
NotifyMDM Device Application User Guide Installation and Configuration for Windows Mobile 6 Devices End-of-Life Notice Please note that GO!Enterprise MDM server version 3.6.3 is the last to officially
More informationMcAfee Enterprise Mobility Management
Technical FAQ McAfee Enterprise Mobility Management Frequently Asked Questions Device Management Q: Which devices do you currently support? A: McAfee Enterprise Mobility Management (McAfee EMM ) offers
More informationManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationEM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab
EM L05 Managing ios and Android Mobile Devices with Symantec Mobile Management Hands-On Lab Description The Symantec Mobile Management platform continues to expand it s offering with new support for native
More informationReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA
User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label
More informationAvira Free Android Security (version 1.2) HowTo
Avira Free Android Security (version 1.2) HowTo Table of contents 1. Introduction... 4 2. Supported Mobile Manufacturers... 4 3. Product Overview... 5 4. Installation... 5 4.1 App installation on the device...5
More informationAbout. IP Centrex App for ios Tablet. User Guide
About IP Centrex App for ios Tablet User Guide December, 2015 1 2015 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,
More informationMonitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches
APPLICATION NOTE Monitoring Network Traffic Using sflow Technology on EX Series Ethernet Switches Exporting sflow to Collectors Through a Separate Virtual Routing Instance Copyright 2009, Juniper Networks,
More information